Opens profile photo
Follow
Mehmet Ergene
@Cyb3rMonk
Threat Hunting & Research, Detection Engineering | Microsoft MVP #MicrosoftSentinel #MicrosoftDefender #KQL #DFIR #DataScience All is one. Opinions are my own
Netherlandsposts.bluraven.ioJoined May 2011

Mehmet Ergene’s Tweets

Pinned Tweet
I spent my free time doing research, learning, etc. during the COVID. It was extremely fun, satisfying, and exhausting. Now, I started focusing on myself more. I'm probably not going to keep the same pace and I don't care. Life is not all about infosec&work.
4
Show this thread
There will always be someone crushing it, developing new stuff constantly. I ask myself: Do I want to be like one of them? Is it going to make me happy? The answer is: I don't care if I fall behind. It's OK to be in the 10% instead of 1%, as long as I'm happy with myself.
1
1
6
Show this thread
"Your time is way too valuable to be wasting on people who can't accept who you are. Don’t sacrifice yourself too much for you cannot make everyone happy. If you want to achieve anything, learn how to love yourself first." (you can modify this for infosec)
1
1
Show this thread
I'd been feeling similar recently until I realized it wasn't a responsibility. From Feynman: "You have no responsibility to live up to what other people think you ought to accomplish. I have no responsibility to be like they expect me to be. It's their mistake, not my failing."
Quote Tweet
I'll be honest, I panic about all the stuff I don't know in my field and that I'm falling further behind all the time. All these people crushing it, developing new stuff constantly, and I feel guilty not working or researching.
2
8
Show this thread

Topics to follow

Sign up to get Tweets about the Topics you follow in your Home timeline.

Carousel

Can someone explain how an SSO provider can be abused in case of such compromise? I mean, what can you do after gaining access to mentioned portals/accounts? How can a customer be affected by it? Don't you need the customer employees' credentials for abuse? #Okta #OktaBreach
6
6
24
iii) If your tooling supports, create and use CI/CD pipelines for managing detection engineering work. This way, you have a single source of truth, 4-eye principles, reporting/dashboarding your work to the management level, etc. 8/9
1
3
Show this thread
8. Here is an example of how you can implement agile on the technical/process level using Azure DevOps: i) Use Scrum or Kanban boards for task tracking ii) Use Azure Repos for your documentation(Wiki, etc.) Using a repo for documentation makes it easy to migrate/integrate 7/9
1
2
Show this thread
7. Consider how you can collaborate with Threat Intelligence, Red team, and others that are outside the SOC in an agile way. If you're dependent on a team that has a different way of working, good luck. You need to align with them in your agile process. 6/9
1
2
Show this thread
SOC Analyst -> Threat Hunting / Detection Engineering (false positive feedback, etc.). It's best to analyze the relations between TH/DE/IR, etc. first, and then set up the teams accordingly. 5/9
1
1
5
Show this thread
6. When you create separate teams and define each of them as products(TH/DE/IR/etc.), you create isolation between teams. Avoid damaging the collaboration. In SOC, several things are tied together: Data source onboarding -> threat hunting -> detection engineering. 4/9
1
2
3
Show this thread
4. Listen to your employees. Agile is a mindset, not a tool. If employees are not happy with it, you have a big problem that can result in high turnover 5. Avoid hiring a scrum master/PO who doesn't have a security background. It's a huge risk, especially for your whole team 3/9
1
5
Show this thread
1. DO NOT copy-paste from the agile. NEVER EVER. 2. FIRST assess your way of working, then analyze which agile method(and which parts) are the most suitable. 3. Sprints aren't for threat hunting. It 'might' apply to detection engineering, depending on how you define it. 2/9
1
2
Show this thread
It’s easy to establish science supported, genuinely health promoting, zero-cost habits if we do them in combination: e.g., outdoor walks/Zone2 cardio in the morning (30min) done nasal breathing only, w/sunlight, followed by cold shower or plunge (2-5min). Total time: 35min.
56
317
2,772
I think we are all gatekeepers. It's just some of us keep all the gates, some of us keep some gates. It doesn't necessarily happen consciously. Most likely, it's unconscious. #NoteToSelf
1
1
3
Last day at work. I'll get some rest and start a new&different chapter in my career. It's going to be quite a big change for me.🤞
12
74
🔥🔥🔥🔥🔥
Quote Tweet
Meet VT4Browsers++, our browser extension to enrich all IOCs in any website you visit. Read all details here: blog.virustotal.com/2022/03/vt4bro
Image
4
Shouldn't we say "security controls" instead of "automated detection systems" and consider SOC analysts as a security control as well? Shouldn't we hunt through the alerts if they are not picked up by SOC analysts? 3/3
4
1
10
Show this thread
Some TTPs can have high fidelity/severity and some have low fidelity/severity. Low ones may have a high false positive rate in many cases and most of the time they may not be picked up because of alert volume. 2/3
1
6
Show this thread
Question(or "going back to principals" exercise): #ThreatHunting is proactively and iteratively searching systems for threats that evade detection by automated threat detection systems. What if the threats are detected but the alerts are skipped/not analyzed by SOC analysts? 1/3
3
11
46
Show this thread
Still one of the best presentations I've watched so far. It's just 20 minutes, highly recommended. If I have a product, I don't like/want to create basic detections that should already be done by the vendor that I'm paying. #ThreatHunting
4
25
112
Just imagine doing your DFIR investigations with this. #DFIR
Quote Tweet
Not sure if this got enough love when it was announced, but you should 100% sign up to the free Azure Data Explorer instance - aka.ms/kustofree. 100 GB of storage, load up whatever data you want (csv, json, txt) and go ham with it
Show this thread
2
3